header-logo
Suggest Exploit
vendor:
Adobe Reader and Acrobat
by:
SecurityFocus
9.3
CVSS
HIGH
Remote Code-Execution
94
CWE
Product Name: Adobe Reader and Acrobat
Affected Version From: Adobe Reader and Acrobat 9.1.2
Affected Version To: Adobe Reader and Acrobat 9.1.2
Patch Exists: YES
Related CWE: N/A
CPE: a:adobe:acrobat_reader
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Adobe Reader and Acrobat Remote Code-Execution Vulnerability

Adobe Reader and Acrobat are prone to a remote code-execution vulnerability because they fail to properly handle certain COM objects. An attacker can exploit this issue by supplying a malicious PDF file or webpage. Successful exploits may allow the attacker to execute arbitrary code in the context of a user running the affected application. Failed attempts will likely result in denial-of-service conditions.

Mitigation:

Users should avoid opening untrusted PDF files and webpages.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/36668/info

Adobe Reader and Acrobat are prone to a remote code-execution vulnerability because they fail to properly handle certain COM objects.

An attacker can exploit this issue by supplying a malicious PDF file or webpage. Successful exploits may allow the attacker to execute arbitrary code in the context of a user running the affected application. Failed attempts will likely result in denial-of-service conditions.

This issue was previously covered in BID 36638 (Adobe Reader and Acrobat October 2009 Multiple Remote Vulnerabilities), but has been given its own record to better document it. 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33283.tar